Sökning: "Shamir’s Secret Sharing"
Hittade 5 uppsatser innehållade orden Shamir’s Secret Sharing.
1. Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents
Master-uppsats, KTH/Radio Systems Laboratory (RS Lab)Sammanfattning : The fourth generation cellular mobile broadband, Long-Term Evolution (LTE), provides high speed Internet via Internet Protocol (IP). Today’s wireless infrastructure paves the way to a connected society where high speed Internet is seamlessly available at all times for anyone to use. LÄS MER
2. A secure multi-party scheme with certificateless cryptography for secret key extraction
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Many systems contain sensitive data such as user credentials used for authentication purposes. For large systems, a common approach is to store the data in a configuration file at a trusted third party. However, that would imply a single point of failure if an adversary gains access to the trusted party. LÄS MER
3. Mobility-based Key Sharing Using Visible Light Communication
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : Visible Light Communication (VLC) has become an increasingly interesting topicamong researchers. The LEDs used in VLC have important characteristics which differfrom radio waves, and which enables a vast spectrum to be used with many security aspects. Light cannot pass through walls and can be directed. LÄS MER
4. Sending Location-Based Keys Using Visible Light Communication
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : In this thesis we explore the possibilities of using Visible Light Communication (VLC) to build a system that is capable of securely sharing small amounts of data in the form of encryption keys in a boundary defined area. We design and implement the MAC and Physical layers of the system. LÄS MER
5. Multiple Escrow Agents in VoIP
Master-uppsats, KTH/Kommunikationssystem, CoSSammanfattning : Using a Key escrow agent in conjunction with Voice over IP (VoIP) communication ensures that law enforcements agencies (LEAs) can retrieve the session key used to encrypt data between two users in a VoIP session. However, the use of a single escrow agent has some drawbacks. LÄS MER